Saturday, October 5, 2019

Internet Marketing Strategy Amazon Essay Example | Topics and Well Written Essays - 3500 words

Internet Marketing Strategy Amazon - Essay Example Amazon.com opened his virtual doors in 1995, and restructured all the retail sector. It was the beginning of a new way of retail transactions. This essay aims to present an analysis of the Amazon’s internet marketing strategy. This analysis will be focused on an evaluation market, an analysis of the competitors and how the internet strategy relates to the overall marketing strategy of the company. Internet Marketing Strategy – Amazon.com Amazon.com is one of the largest online retail stores in the world. They open their virtual doors in 1995 and nowadays have net sales of $ 48,077 millions per year, growing 33% per year. Amazon.com begins their business selling books. Nowadays they still sell books, but also technology, clothes, shoes, ebooks. Additionally they improve their e-services with the Amazon Web Services ( AWS). It seems like Amazon.com is always one step ahead. The purpose of this essay is to analyze their Internet Marketing Strategy. In order to analyze the Amazon internet marketing strategy, first will be present an evaluation of their online market: size and growth, online marketing segmentation, sales and e-service. The retail sector is a very competitive sector. Amazon.com has many competitors include other online retail stores. In this essay eBay market will be studied. The internet is a powerful tool in a company's business. ... The first amazon.com website was opened in July 1995. Nowadays Amazon has 56,200 full-time and part-time employees ( data from December 31, 2011). Amazon focusses their strategy in the customers. They attempt to â€Å"seek to be Earth’s most customer-centric company for four primary customer sets: consumers, sellers, enterprises, and content creators.† Amazon is a retail online. They generate revenues from the online sales. Recently they invested in another source of revenues as marketing and promotional services (online advertising, and co-branded credit card agreements). In general they are organized into two principal market segments: North America and International. The main communication channel is the website. Amazon reaches their consumers through their retail websites. Amazon has a very competitive business. Examples of competitors in this sector are: â€Å"Our (1) physical-world retailers, publishers, vendors, distributors, manufacturers, and producers of our products; (2) other online e-commerce and mobile e-commerce sites, including sites that sell or distribute digital content; (3) a number of indirect competitors, including media companies, web portals, comparison shopping websites, and web search engines, either directly or in collaboration with other retailers; (4) companies that provide e-commerce services, including website development, fulfillment, and customer service; (5) companies that provide infrastructure web services or other information storage or computing services or products; and (6) companies that design, manufacture, market, or sell digital media devices. â€Å" The principal competitive factors are: . Retail business: retail selection and convenience; . Seller and enterprise services: quality,

Friday, October 4, 2019

Comparing Human Resource Management in Multinational and Local Essay

Comparing Human Resource Management in Multinational and Local Companies in Hong Kong - Essay Example Moreover, there is a clear difference in how it is executed. All employees from the American company were divided into different groups, and in order to ensure efficient management of the employees, a manager was assigned to each group. The company also had a data base where each individual's sales performance and feedback from customers was encoded and saved. In these instances, in terms of employee performance, employees within the group were also allowed to put in their opinion of their colleagues. Using numerical totals from the database, an evaluation on how each person has been performing could easily be established. Moreover, the interesting part of this database is on how customers’ feedback was also accounted for in the overall evaluation of the employees. The fact that the employees formed groups to monitor one another was very much in keeping with the findings of Bjorkman (2003) on Chinese companies’ putting greater emphasis on team work. The Swiss company al so showed traces of an Appraisal system in place. They also went through a performance evaluation process for their employees. They mostly divided their staff into two groups: first, the lower level staff which were general operational staff, and second, the other staff which were usually higher level employees. The lower level staff usually underwent a two-way communication process using the Preference Evaluation (PE) form. Employees would then set objectives at the beginning of the year, with fulfillment of the objectives monitored throughout the year. By the end of the year, their managers usually evaluated the individuals by assessing whether or not they have achieved their objectives. A performance rating also followed the assessment. Among higher level staff, they also underwent a similar evaluation process, however, the review was called performance cycle, and was usually done through an online tool. These individuals also set objectives at the beginning of the year and were then monitored throughout the year. The difference in these two groups of employees is that towards the end of the year, there was a performance calibration session conducted by the managers on the employees. Such a session was not carried out on managers. This session consisted of an open forum where the managers discussed employee performance and then agree on a performance rating for each employee. This allowed a more unbiased evaluation of the employees. It also created a chance for cross department discussions and the sharing of opinions among these departments. In contrast, employees from the Hong Kong Company revealed that their company was using a more traditional appraisal system. Managers evaluated employees’ attitude in the workplace, and took into account the number of times each employee was late for work or if their work was done on time. The Hong Kong company does not have an evaluation system like the other two companies, and the employees’ evaluation i s mainly based on their performance and the perception of their managers. The Swiss company’s evaluating system shares some similarities with the American company. They both have a database for the easy evaluation of their employees. They also have groups which help with the evaluation process and which help illuminate the probability of bias. Both companies have traces of HR practices from the East and the

Thursday, October 3, 2019

Web 2.0 Defined Essay Example for Free

Web 2.0 Defined Essay Web 2. 0 has been identified with the pronounced difference involving functionality and the current advances in web technology that makes it possible to develop innovative business models and processes based on these modular structures. This has been already used in education such as online learning tools and models. Web 2. 0 has also been able to modify the way web content has been stored, organized and properly categorized. Lastly, the development of Web 2. 0 has also contributed significantly to the rise of economic value of the internet that may possibly exceed the impact of the dot com (OReilly, 2006). Earlier users of the phrase Web 2. 0 employed it as a synonym for Semantic Web. The combination of social-networking systems such as FOAF and XFN with the development of tag-based folksonomies, delivered through blogs and wikis, sets up a basis for a semantic web environment. Tim OReilly regards Web 2. 0 as business embracing the web as a platform and utilising its strengths (global audiences, for example). OReilly considers that Eric Schmidts abridged slogan, dont fight the Internet, encompasses the essence of Web 2. 0 building applications and services around the unique features of the Internet, as opposed to building applications and expecting the Internet to suit as a platform (effectively fighting the Internet). Unlike Web 1. 0, Web 2. 0 is a bit of a catch-all which covers a broad rang of new online services, user-generated content, communities and social networking tools. Tim OReillys definition of Web 2. 0 in his Radar web column (OReilly 2005) is a comprehensive description of what Web 2. 0 is. Web 2.0 was described as a compilation of economic, social, and technology trends that when pooled together cohesively creates the foundation for the development of the next level of the internet a more mature, distinctive medium characterized by a high degree of participation among the people, directness, and network effect. The definition originated during a brainstorming session between OReilly Media_ and MediaLive executives in 2004. OReilly (2005) has also created a famous meme-map_, which attempts the central work of defining the interlocking elements of web 2. 0. The core value of web 2. 0 is the development of a solid set of technologies. OReilly also introduces all the major planks of this vision of the next generation of the web as a set of best practices from the first generation. However, Gartenberg (2006) speaking on a postcast_ indicates Web 2. 0 means different things to different people, and there-in lies the difficulty of trying to define clearly a term that it far more a marketing term than a technical term (Gartenberg 2006). OReilly (2006) in his Commencement Speech at UC Berkley_, explained that the genuine Web 2.0 application is the one where there is a proportionality between the number of users and the development of the application. Because of this, it is argued that the core value of Web 2. 0 is being able to effectively harness the innovativeness of everyone in the group. This kind of development is a step forward as compared to the previous state of the internet where the Web as a platform remained a baffling mess of buzzwords with no real clarity. Spolsky(2005) agreed with this stating that Web 2. 0 is a big, vague, nebulous cloud of pure architectural nothingness and that when people use the term Web 2. 0, I always feel a little bit stupider for the rest of the day. Although this is obviously true, in this specific sense, the concept of the Web 2. 0 application is nothing new at all to the World Wide Web. The term Web 2. 0 is used when a read-write aspect of the Web is used in a participatory way that actually creates greater shared knowledge for all. It was the widespread adoption of blogs, wikis, MySpace and other read-write techniques that ushered in a common I-write-and-everyone-reads-it usage pattern (Hinchcliffe 2006). Figure 2. 1 is a mind map outlining some of the major concepts and technologies which contribute to Web 2. 0. _ Fig 2. 1: Web 2. 0 Technologies Mind Map Web 2. 0 Applications There are number of applications that demonstrate the foundations and the functionalities of the Web 2. 0 concept. The following discussion is a list of popular Web 2. 0 applications and how it is integrated already in society. Blogs The concept of Weblog or Blogging has been defined by Drezner and Farrell (2004) as A web page with minimal to no external editing, providing on-line commentary, periodically updated and presented in reverse chronological order, with hyperlinks to other online sources. Yet even though this definition exists, other researchers such as Nardi et al (2004) express that weblogs currently accessible in the internet have a great diversity that is there is not a single dominant style of activity in the net. Others (Dyrud , Worley Quible, 2005) agree with this but on the hand, they expressed that there is something common to all blogs and that is they are primarily a venue in order to share information (regardless of the amount and manner) between people, groups, and organizations. According to Blood (2000) there are essentially two types of weblog: those that emphasize the diary and comment aspect, and those that emphasize hyperlinks. The former may seek to influence wider public opinion, or merely to raise the profile of the blogger; the latter act as a filter system, looking at what exists on the Web and recommending content that might be of interest to visitors. If bloggers make mistakes in the information they publish, they rely on their peers to point out any errors (Johnson and Kaye 2004) this sentence is very stand alone you may wish to introduce the idea of authority of authority of Web 2.0 technologies (which will presumably covered again in Wikis etc) . Thus, Blogs have unique features that traditional web media does not have. About 2. 7 million bloggers update their blogs at least weekly. According to Technorati, new blog creation continues to grow Figure X shows the number of new blogs created each day, from January 2004 to January 2006: _ Figure 2: New blogs (taken from Technoroati) _ As was mentioned above, there are various types of blogs and each variation provides the information to the user as different as possible. Factors to be considered are the type of the media to be used in order to transfer the information, the device that is used, the genre, the legal status of the publishers, blog search engines, and blogging communities and directories. One varying consideration to blogs is the kind of media that is used in order to share the message from the person/organization that would want to give the message to the recipient of the message. Take for example; a video blog is called a vlog, a blog that is comprised of links to other sites or networks is called a linklog. Another kind of blog that contains a series of sets of sketches is called a sketchblog and another type similar to a sketchblog is called a photoblog one that comprises of photos being shared, uploaded and downloaded. Another type of media that is currently being used by blogs is the tumbleblogs that have shorted posts and mixed media types. The other forms of media currently existing in blogs are called artlogs that is practically a form of blog that shares art and publishes it over the internet. The second point for consideration is the blogs genres. Some blogs are more focused on a specific type of subject such as blogs focused on the environment, travel, politics, nature, academic work, technology, etc. Each blog naturally has a specific genre that it revolves around. In the case for education, educational blogs focus on a particular topic or issue for the students or the researchers. This helps in narrowing down the topic field at the same time helps the users in being able to have a more focused blog where they can extrapolate vital information and not be flooded with unnecessary information that would not be useful to the students and researchers (Kline Burstein, 2005). Blogs can be classified as legal or rather private, or it can be public. The difference between the two is accessibility. In the case for private blogs, these blogs are used internally within organizations or within groups. One trait for this kind of blog is its restriction on accessibility. Public blogs offer free and unrestricted access to most if not all users in the web. They are given the opportunity to download, upload and communicate information using these blogs. Both blogs have been used in education as a means in order to distribute effectively information within the personnel of institutions (Hinchcliffe, 2006). In case for private blogs, educational institutions utilize these kind of blogs within their intranet infrastructure whereas public blogs are used for providing free and unrestricted education to those that do not have accessibility or the opportunity to access that kind of education (Kline Burstein, 2005). A considerable number of blogs are used also as search engines in order to find and identify specific items within the internet. These web 2. 0 applications are used in order to tag and categorize specific blog postings and information within the community or within the internet and flag them to the user. Lastly, blogs are used as a means of being able to communicate between people and organizations across distances. Blogs have the capacity to load directories, profiles and information of specific organizations or communities and can be accessed (depending on the restrictions imposed within the site) by the people using it. Wikis The original wiki, The Portland Pattern Repository (Portland pattern repository, n.d) was created by Full Name Cunningham in 1995 (c2. com/cgi. wiki? WikiHistory reference properly if there is no author use the title of the page The definition of a wiki is a webpage or set of webpages that can be easily edited by anyone who is allowed access (Edersbach et al. ,2006_). The overriding goal of a wiki is to become a shared repository of knowledge with the knowledge base growing over time (Godwin-Jones, 2003). Chawner and Lewis (2004) noted that a wiki is an example of social software, a type of software that makes it easy for groups of people to work in a virtual environment. However, Viegas , Wattenberg and Dave (2004) indicate that wikis are vulnerable to malicious edits or vandalism, which can be a problem at may levels. However, Cych (2006) argues that acts of vandalism and mistakes are rectified quite quickly by the self-moderation processes at work (a couple of sentences expanding on this issue is needed here if I were you Id try and refer to something which discusses the accuracy of wikipedia against the encyclopeadia britannica). As an alternative to the global editing of wikis, restricting access to registered users only is often used for professional, work group wikis. One of the great features of a wiki is its capacity to be able easily editable. A wiki has the capacity to be able to be edited collaboratively rather the information presented in wikis have the option to be edited or added utilizing a very rudimentary mark-up computer code that would use a internet explorer or browser. Broken down, one page within a wiki is referred by many as a wiki page as compared to the entire set of wiki pages is called a wiki when taken into consideration (Cunningham Leuf 2001). Thus, it can be generalized that a wiki is a collection of information where contributors can contribute collectively and users can access freely information. This has been proven as one of the most accessible or effective web 2. 0 applications in providing accessible and affordable information to students and researchers. One characteristic of a wiki that has made it so popular in sharing and communicating information to students is its ease of usability. Students need not have a degree in computer science or web applications but rather just the passion of sharing intuition and a little bit of patience in order to learn the scripts involved in the programming. They are free and without any need for registration so that users need not have the need to register or pay any amount (Aigrain 2003). It also offers real-time editing and creation so it provides the opportunity for students, researchers and faculty with much needed time as they acquire, research, and provide information within the educational institution. To summarize, unlike blogs, Wikis tend to be more structured and flexible,and, while blogs can be highly personal, wikis are intensely collaborative (Godwin-Jones, 2003). Social networking technologies (Myspace, Facebook, Flickr †¦. ) A social network service existing within the internet is created for the purpose of being able to create, develop an online community and confirm the legitimacy of its members. These communities, as was explained in blogs and their genres have a common trait which is mainly the reason why these people collectively group themselves together and form a social network based on the internet (Hinchcliffe, 2006). They are either grouped because of their desire to share their interests, activities, goals and passions in life. They are able to share this passion using the means of the internet as a medium of expression, particularly with the use of social networking services. One such social network that can be utilized is Myspace. In Myspace, as a new person joins a social networking site, other users of the site also benefit. Once the Network Effect begins to build and people become aware of the increase in a services popularity, a product often takes off very rapidly in a marketplace. MySpace membership rose to a reported 87 million_. You need to expand this to include some academic literature on social networking technologies. Impact of web2. 0 on the way people interact Web 2. 0 in practice is as mentioned by OReilly (2005) is a medium through which society can exchange (upload and download) information and interact with each other as never before offered by the Internet. This was further asserted by Boyd (2003) that wrote an article describing social software supporting the desire of individuals to affiliate, their desire to be pulled into groups to achieve their personal goals. On the other hand, Berners-Lee (1999 p. 157) talks about the information space as something to which everyone has immediate and intuitive access, and not just to browse ,but to create. Today, many people are setting up and writing blogs and working together to create information through the use of wikis, blogs and MySpace. Web 2. 0 software has emerged to facilitate new activities, and encourages a more human approach to interactivity on the Web. Web 2. 0 has become a tool that mainly focuses on providing opportunities for people or groups to maximize the Web in delivering information (conversations, data, etc. ) to and fro users. As Abaram (2005) claims, the social web is about conversations, personalization and individualism. It is interesting that it has been referred to as a People-Centric Web (Robinson 2005). Thus, With Web 2. 0 technologies you not only get the results of knowledge stored in a searchable fashion, but you also get the process of creating the knowledge made observable (McAffee 2006). Learning and Teaching Social software is being used by many individuals in Higher. As such it seems possible that students are likely to engage with these technologies and that they therefore may have potential for changing the way of teaching and learning. Collaborative learning is an activity where learners who are brought together through the Internet focus on working together as a learning community in which they share resources , knowledge, experiences and responsibilities (Maged N. Wheelert 2007). Need a discussion of why collaborative learning is useful. One of the potential impacts of social software on education was carried out by the Nesta-funded Future Lab project. The report called Social Software and Learning which was researched and created by Owen et al. (2006) was able to evaluate and review the developing trends in education and had indicated that learning will be more open, and that in schools and colleges, there is a greater emphasis on lifelong leaning and supporting the development of young peoples skills in creativity and innovation. On the other hand, Maloney (2007) realized that there are challenges that are now evident on how to figure out how to incorporate the paradigm-altering technologies of Web 2. 0 into teaching and learning and to maximize it potential in delivering information and promoting interactivity. One of these opportunities is On-line course-management. Maloney (2007) indicates that the most significant problem with course-management systems is that they are built around the credit-based courses and is not founded on the individual student. Although social tools are enabling users to rapidly connect with each other. But the challenge that that is now presented to most researchers in the field of Web 2. 0 integration to education and learning is being able to figure out a manner in incorporating the paradigm-altering technologies of Web 2. 0 into teaching and learning. Take for instance the example of Constitution High School where students are already heavily engaged in Web 2.0 technologies through social networking websites such as MySpace (Strike the Tent 2006). They articulated a vision, planned curriculum, designed assessment rubrics, debated discipline policies, and even hammered out daily schedules using the sort of networking tools messaging, file swapping, idea sharing, and blogging. Within High Education, Blogs seem to be the most commonly used by students as an assessed reflective diary . Tutors could use a blog to share annotated weblinks or links to news items which students can follow up as they have the opportunity (Report of the Information Services Working Group on Collaborative Tools 2006). The University of Warwick in UK has used Blogging software in this way. They have provided Blogging facilities to allow staff and students to create their personal pages. The intention is that the system will have a variety of education-related uses such as developing essay plans, creating photo galleries and recording personal development_. Wikis have also been used for educational purposes, according to report by Anderson (2007) wikis have been used at the University of Arizonas Learning Technologies Centre to help students on an information studies course who were enrolled remotely from across the USA. These students collated data individually but then worked together to build a wiki-based glossary. The resulting dataset was then shared and analyzed by the group (Glogoff, 2006). At the State University of New York, the Geneseo Collaborative Writing Project deploys wikis to support student work. The Wikis are used to track the ongoing development and evolution of projects, share ideas, and improve their research and communication skills collectively. Wiki-style technology has also been used in a tool developed at Oxford University to support teachers with design for learning.

Wednesday, October 2, 2019

Traditional File Systems Essay

Traditional File Systems Essay The traditional filing system (TFS) is a method of storing and arranging computer files and the information in the file (data). Basically it organizes these files into a database for the storage, organization, manipulation, and retrieval by the computers operating system. (DBMS) consists of software that operates databases, providing storage, access, security, backup and other facilities. This system can be categorized according to the database model and the type of computer that they support such as a server cluster or a mobile phone, the query language(s) that access the database, such as SQL or XQuery, performance trade-offs, such as maximum scale or maximum speed or others. Some DBMS cover more than one entry in these categories, e.g., supporting multiple query languages. Meanwhile database management systems are usually accessed in a client-server manner, where the database client and the server are located on different machines (in a local area network). Both systems deal with information management. File-based System File-based systems were an early attempt to computerize the manual filing system. File-based system is a collection of application programs that perform services for the end-users, such as updating, insertion, deletion adding new files to database etc. Each program defines and manages its data. When a computer user wants to store data electronically they must do so by placing data in files. Files are stored in specific locations on the hard disk (directories). The user can create new files to place data in, delete a file that contains data, rename the file, etc which is known as file management; a function provided by the Operating System (OS). Disadvantages of traditional file based system No need of external storage Provides less security. No need of a highly technical person to handle the database. Redundancy is more. Processing speed is high as compared to DBMS Less integrity. High complexity in updating of database. Table 1.1.1 Database Management System The improvement of the File-Based System (FBS) was the Database Management System (DBMS) which came up in the 60s. The Database Management System removed the trouble of manually locating data, and having to go through it. The user could create a suitable structure for the data beforehand, to place the information in the database that the DBMS is managing. Hence, the physical organizing of files is done away with and provides the user with a logical view of the data input. A database is a collection of interrelated information stored in a database server; these data will be stored in the form of tables. The primary aim of database is to provide a way to store and retrieve database information fast and in an efficient manner. Advantages Control of data redundancy Although the database approach does not remove redundancy completely, it controls the amount of redundancy in the database. Data consistency By removing or controlling redundancy, the database approach reduces the risk of inconsistencies occurring. It ensures all copies of the idea are kept consistent. More information from the same amount of data With the amalgamation of the operated data, it is possible to derive additional information for the same data. Sharing of data Database belongs to the entire organization and can be shared by all authorized users. Improved data integrity Database integrity provides the validity and consistency of stored data. Integrity is usually expressed in terms of constraints, which are consistency rules that the database is not permitted to violate. Improved security Provides protection of data from unauthorized users. It will require user names and passwords to identify user type and their access right in the operation including retrieval, insertion, updating and deletion. Enforcement of standards The integration of the database enforces the necessary standards including data formats, naming conventions, documentation standards, update procedures and access rules. Economy of scale Cost savings can be obtained by combining all organizations operational data into one database with applications to work on one source of data. Balance of conflicting requirements By having a structural design in the database, the conflicts between users or departments can be resolved. Decisions will be based on the base use of resources for the organization as a whole rather than for an individual person. Improved data accessibility and responsiveness By having integration in the database approach, data accessing can cross departmental boundaries. This feature provides more functionality and better services to the users. Increased productivity The database approach provides all the low-level file-handling routines. The provision of these functions allow the programmer to concentrate more on the specific functionality required by the users. The fourth-generation environment provided by the database can simplify the database application development. Improved maintenance Provides data independence. As a change of data structure in the database will affect the application program, it simplifies database application maintenance. Increased concurrency Database can manage concurrent data access effectively. It ensures no interference between users that would not result any loss of information or loss of integrity. Improved backing and recovery services Modern database management system provides facilities to minimize the amount of processing that can be lost following a failure by using the transaction approach. Disadvantages Complexity A difficult software. All users must be familiar with its functionality and take full advantage of it. Therefore, training for the administrators, designers and users is required. Size Uses a substantial amount of main memory as well as large amount of disk space in order to make it run efficiently. Cost of DBMS A multi-user database management system may be very expensive. Even after the installation, there is a high regular annual maintenance cost on the software. Cost of conversion When moving from a file-base system to a database system, the company is required to have additional expenses on hardware acquisition and training cost. Performance As the database approach is to cater for many applications rather than exclusively for a particular one, some applications may not run as fast as before. Higher impact of a failure Increases the vulnerability of the system due to the centralization. As all users and applications reply on the database availability, the failure of any component can bring operations to a halt and affect the services to the customer seriously. The difference between TFS and DBMS Balajee B. (2005), There are number of characteristics that differ from traditional file management system to database management system. In file system approach, each user implements the required files for a specific application to run. (Example: in a sales department of an enterprise, one user will be maintaining the details of the number of sales personnel in that department and their grades. These details will be stored and maintained in a separate file. Another user will maintain the salary details of these sales personnel and the detailed salary report will be stored and maintained in a separate file. Although both of the users need the data of the salespersons, they will be having their details in separate files and they need different programs to operate their files.) When such data is isolated in separate files, it is difficult to access data that should be available for both users. This will lead to wastage of space and redundancy or replication of data, which may lead to c onfusion, as sharing of data among various users is not possible and data inconsistency may occur. These files will not be having any inter-relationship among the data stored in these files. Therefore in traditional file processing every user will be defining their own constraints and implement the files according to their needs. In database approach, a single store of data is maintained that is defined once and then accessed by many users, as database belongs to the entire organization and can be shared by all authorized users. The essential characteristic of database approach is that the database system not only contains data but it contains complete definition or description of the database structure and control. These definitions are stored in a system catalog, which contains the information about the structure and definitions of the database. The information stored in the catalog is called the metadata, it describes the primary database. Hence this approach will work on any type of database for example, insurance database, Airlines, banking database, Finance details, and Enterprise information database. But in traditional file processing system the application is developed for a specific purpose and they will access specific database only. But the processing speed in TFS is high compared to DBMS. The other main characteristic of the database is that it will allow multiple users to access the database at the same time and sharing of data is possible. The database must include concurrency control software to ensure that several users trying to update the same data at the same time, it should maintain in a controlled manner. In file system approach many programmers will be creating files over a long period and various files have different format, in various application languages, where duplication of data can occur. This redundancy in storing same data multiple times leads to higher costs and wastage of space. This may result in data inconsistency in the application; this is because update is done to some of the files only and not all of the files. Moreover in database approach multiple views can be created; External view User/Application view, Conceptual view Logical view, Internal view Details about the structure of data and physical storage of information. View is a tailored representation of information contained in one or more tables. View is also called as Virtual table because view does not contain physically stored records and will not occupy any space. A multi-user database whose users have variety of applications must provide facilities for defining multiple views. In traditional file system, if any changes are made to the structure of the files it will affect all the programs. Therefore, changes to the structure of a file will require to change all programs that access the file and whereby data dependence will be lost. But in the case of database approach the structure of the database is stored separately in the system catalog from the access of the application programs. This property is known as program-data independence. Database can also be used for continuous storage for program objects and data structures that resulted in object oriented database approach. Traditional systems suffered from impedance mismatch problem and difficulty in accessing the data, which is avoided in object oriented database system. Database can be used to represent complex relationships among data as well as to retrieve and update related data easily and efficiently. Hence DBMS does not automatically remove redundancies, but help to control redundancy. It is possible to define and enforce integrity constraints for the data stored in the database. The database also provides facilities for recovering hardware and software failures, as it has automatic and intelligent backup and recovery procedures. It reduces the application development time considerably when compared to the file system approach and availability of up-to-date information of all the users. It also provides security to the data stored in the database system and maintains integrity. A highly technical person will be required to handle the database, while for TFS, it is not so. File-based systems are very dependent upon the application programmer. Any required queries or reports have to be written by the application programmer. Normally, a fixed format query or report can only be entertained and no facility for ad-hoc queries if offered. DBMS has data independence. The way information is stored and the way information issued is independent of each other. File-based systems also give tremendous pressure on data processing staff, with users complaints on programs that are inadequate or inefficient in meeting their demands. Documentation may be limited and maintenance of the system is difficult. Provision for security, integrity and recovery capability is very limited. Whereas, DBMS has control over security as it provides tools such as use of User Code, Password / Privileges and Roles to ensure security of data. Data, Field, Record, and File are the main components of Database environment. Briefly explain those. Data Webopedia (Anon., n.d.), Distinct pieces of information usually formatted in a special way. All software is divided into two general categories: data and programs. Programs are collections of instructions for manipulating data. Data can exist in a variety of forms as numbers or text on pieces of paper, as bits and bytes stored in electronic memory, or as facts stored in a persons mind. Strictly speaking, data is the plural of datum, a single piece of information. In practice, however, people use data as both the singular and plural form of the word. The term data is often used to distinguish binary machine-readable information from textual human-readable information. For example, some applications make a distinction between data files (files that contain binary data) and text files (files that contain ASCII data). In database management systems, data files are the files that store the database information, whereas other files, such as index files and data dictionaries, store adminis trative information, known as metadata. Field Webopedia (Anon., n.d.), A space allocated for a particular item of information. A tax form, for example, contains a number of fields: one for your name, one for your Social Security number, one for your income, and so on. In database systems, fields are the smallest units of information you can access. In spreadsheets, fields are called cells. Most fields have certain attributes associated with them. For example, some fields are numeric whereas others are textual; some are long, while others are short. In addition, every field has a name, called the field name. In database management systems, a field can be required, optional, or calculated. A required field is one in which you must enter data, while an optional field is one you may leave blank. A calculated field is one whose value is derived from some formula involving other fields. You do not enter data into a calculated field; the system automatically determines the correct value. A collection of fields is called a record. Record Webopedia (Anon., n.d.), In database management systems, a complete set of information. Records are composed of fields, each of which contains one item of information. A set of records constitutes a file. For example, a personnel file might contain records that have three fields: a name field, an address field, and a phone number field. In relational database management systems, records are called tuples. Some programming languages allow you to define a special data structure called a record. Generally, a record is a combination of other data objects. For example, a record might contain three integers, a floating-point number, and a character string. In database management systems, a complete set of information. Records are composed of fields, each of which contains one item of information. A set of records constitutes a file. For example, a personnel file might contain records that have three fields: a name field, an address field, and a phone number field. Figure 1.2.1 Source Author Anon., File Webopedia (Anon., n.d.), A collection of data or information that has a name, called the filename. Almost all information stored in a computer must be in a file. There are many different types of files: data files, text files, program files, directory files, and so on. Different types of files store different types of information. For example, program files store programs, whereas text files store text. What is the Importance of DBMS in a Defense Organization and in an Education Department? Defence Organization Benjamin (n.d.), A Database Management System (DBMS) is a set of computer programs that controls the creation, maintenance, and the use of the database with computers of an organization and its end users. It allows organizations to place control of organization-wide database development in the hands of database administrators (DBAs) and other specialists. As organizations develop with time, their adoption to the latest technologies in the computer field becomes a necessity. A Defence organization is no different. In these turbulent times, when national security is more important, providing all Defence personnel with access to the latest technology and education opportunities not only directly contributes to Defence capability but also improve the defence personnels career development. Hence the importance of a DBMS in such an organization like Defence is vital. Because Database administrators could use this system to configure and operate databases as the software provides high level, privileged database access. But the management should restrict use of this software to authorized personnel. One function of the database administrator is to create particular views of information stored in the database that are unique for each type of user. For example, one officer will have a different view of information in the database than another, say Senior officer. The different user groups will also have different abilities to add, modify, or delete information. The database administrator is responsible for providing users with access to the appropriate level of information. The primary risk associated with database administration is that an administrator can alter sensitive data without those modifications being detected. A secondary risk is that an administrator can change access rights to information stored within the database as well as their own access rights. Database security is the last line of defence. So it deserves greater focus on the protection of private data from both internal and external. The sensitivity and classification of the information stored in the database form the basis for establishing controls. A database that stores confidential information may require a more significant control environment than a database that stores non-sensitive information. Management should consider the security and performance implications of the security options available with modern database management systems. Database security professionals and information security and risk management professionals could adopt a security strategy in DBMS to: 1) Align database security policies with information security policies; 2) Ensure well-defined and formalized database security procedures; 3) Enforce role separation; and 4) Apply advanced security measures such as database auditing, monitoring, database encryption, data masking, and vulnerability assessment to all critical databases that store private data. The DBMS can provide long-term benefits for the Defence organization reducing duplication of data and making it easier for HR to update personnel records. If not for DBMS, each time there was a personnel change, trainers would have to go through their entire content to make the necessary changes. Now, replacing Brigadier Xs picture in the content library with Commodore Ys picture can be automatically replicated through all relevant programs. Thereby reduce its expenditure on storage. But, initial training will be required for all programmers and users. Even though database systems are complex, difficult, and time-consuming to design, there is greater data integrity and independence from applications programs and Education Department Sue Bushell (2004), To improve teaching and learning with the help of modern information and communication technology eLearning is beneficial to education, corporations and to all types of learners. It is affordable, saves time, and produces measurable results. E-learning comprises all forms of electronically supported learning and teaching. The Information and communication systems, whether networked or not, serve as specific media to implement the learning process. E-learning services have evolved since computers were first used in education. There is a trend to move towards blended learning services, where computer-based activities are integrated with practical or classroom-based situations. E-learning is essentially the computer and network-enabled transfer of skills and knowledge. E-learning applications and processes include Web-based learning, computer-based learning, virtual classroom opportunities and digital collaboration. Content is delivered via the Internet, intranet/extranet, audio or video tape, satellite TV, and CD-ROM. It can be self-paced or instructor-led and includes media in the form of text, image, animation, streaming video and audio The definition of e-learning varies depending on the organization and how it is used but basically it involves electronic means of communication, education, and training. Regardless of the definition you chose to use, designers, developers, and implementers make or break the instructional courses and tools. E-learning is simply a medium for delivering learning and like any other medium, it has its advantages and disadvantages. E-learning covers a wide array of activities from supported learning, to blended or hybrid learning (the combination of traditional and e-learning practices), to learning that occurs 100% online. As per wikipedia.org, the worldwide e-learning industry is estimated to be worth over $48 billion US according to conservative estimates. Developments in internet and multimedia technologies are the basic enabler of e-learning, with consulting, content, technologies, services and support being identified as the five key sectors of the e-learning industry. E-learning is naturally suited to distance learning and flexible learning, but can also be used in conjunction with face-to-face teaching, in which case the term Blended learning is commonly used. E-Learning pioneer Bernard Luskin argues that the E must be understood to have broad meaning if e-learning is to be effective. Luskin says that the e should be interpreted to mean exciting, energetic, enthusiastic, emotional, extended, excellent, and educational in addition to electronic that is a traditional national interpretation. This broader interpretation allows for 21st century applications and brings learning and media psychology into the equation. E-Learning can also refer to educational web sites such as those offering learning scenarios, worksheets and interactive exercises for children. The term is also used extensively in the business sector where it generally refers to cost-effective online training There are many advantages to online and computer-based learning when compared to traditional face-to-face courses and lectures. There are a few disadvantages as well. Advantages of eLearning (Anon., n.d) E-learning is beneficial to education, corporations and to all types of learners. It is affordable, saves time, and produces measurable results. Cost effective E-learning is more cost effective than traditional learning because less time and money is spent traveling. Since e-learning can be done in any geographic location and there are no travel expenses, this type of learning is much less costly than doing learning at a traditional institute. Flexibility Flexibility is a major benefit of e-learning. E-learning has the advantage of taking class anytime anywhere. Education is available when and where it is needed. E-learning can be done at the office, at home, on the road, 24 hours a day, and seven days a week. Learners like e-learning because it accommodates different types of learning styles. They have the advantage of learning at their own pace. Students can also learn through a variety of activities that apply to many different learning styles. Learners can fit e-learning into their busy schedule. If they hold a job, they can participate in eLearning right at their desk. If the learner needs to do the learning at night, then this option is available while in their pyjamas and do the learning if they desire. Personalized learning E-learning encourages students to peruse through information by using hyperlinks and sites on the worldwide Web. Learners are able to find information relevant to their personal situations and interest. E-learning allows selection of learning materials that meet their level of knowledge, interest and what they need to know to perform more effectively in an activity. E-learning is more focused on the learner and it is more interesting for the learner because it is information that they want to learn. E-learning is flexible and can be customized to meet the individual needs of the learners. Develops knowledge E-learning helps develop knowledge of the Internet. This knowledge will help learners throughout their careers. E-learning encourages students to take personal responsibility for their own learning. When learners succeed, it builds self-knowledge and self-confidence Disadvantages of eLearning Access One disadvantage of eLearning is that learners need to have access to a computer as well as the Internet. They also need to have computer skills with programs such as word processing, Internet browsers, and e-mail. Without these skills and software it is not possible for the learner to succeed in eLearning. E-learners need to be very comfortable using a computer. Slow Internet connections or older computers may make accessing course materials difficult. This may cause the learners to get frustrated and give up.   Software and files Another disadvantage of e-learning is managing computer files, software comfortability and learning new software, including e-learning. For learners with beginner-level computer skills it can sometimes seem complex to keep their computer files organized. The lesson points you to download a file which the learner does and later cannot find the file. The file is downloaded to the folder the computer automatically opens to rather than a folder chosen by the learner. This file may be lost or misplaced to the learner without good computer organizational skills. High motivation E-learning also requires time to complete especially those with assignments and interactive collaborations. This means that students have to be highly motivated and responsible because all the work they do is on their own. Learners with low motivation or bad study habits may not complete modules and may fall behind Isolation Another disadvantage of e-learning is that students may feel isolated and unsupported while learning. Instructions are not always available to help the learner so learners need to have discipline to work independently without assistance. E-learners may also become bored with no interaction with instructors or classmates.   Without the routine structures of a traditional class, students may get lost or confused about course activities and deadlines. Instructor may not always be available when students are studying or need help Conclusion Today many technologies can be, and are, used in e-learning, from blogs to collaborative software, E-Portfolios, and virtual classrooms. Most e-learning situations use combinations of these techniques. Even though the hardware and software start-up are costly, the advantages are; reduced data redundancy, reducing updating errors and increased consistency, greater data integrity and independence from applications programs, improved data access to users through use of host and query languages, improved data security and availability of facilitated development of new application programs and ability for intensive research are the benefits of DBMS. Task 2 Draw an Entity Relationship Data Model which describes the content and structure of the data held by the Medi Check Hospital. Produce the resulting tables of above Medi Check Hospital and clearly indicating the primary and foreign keys. Data Tables Doctor DoctorID (primary) Lname Fname Address Phone Pager Specialty Location Availability Patient PatientNo (primary) PatientFirstName PatientLastName PatientAddress PatientTelNo PatientDob PatientMaritalStatus PatientDateRegistered Appointment AppointmentNo (primary) PatientName Date/Time PatientTelNo Symptom SymptomCode (primary), SymptomName Description Treatment TreatmentTitle (primary) TreatmentType Duration Status TreatmentCost Medication MedicationNo (primary) MedicationType SideEffect Dosage Frequency Severity MedicationBrandName MedicationManufactureName MedicationManufactureAddress MedicationManufactureTel Normalize these tables to ensure that are all in BCNF. Show the steps you have taken in normalizing the tables. UNF Medication (DoctorID, Lname, Fname, Address, Phone, Pager, Specialty, Location, Availability, PatientNo, PatientFirstName, PatientLastName, PatientAddress, PatientTelNo, PatientDob, PatientMaritalStatus, PatientDateRegistered, AppoinmentNo, PatientName, Date/Time, PatientTelNo, SymptomCode, SymptomName, Description, TreatmentTitle, TreatmentType, Duration, Status, TreatmentCost, MedicationNo, MedicationType, SideEffect, Dosage, Frequency, Severity, MedicationBrandName, MedicationManufactureName, MedicationManufactureAddress, MedicationManufactureTel) 1NF Doctor Details (DoctorID, Lname, Fname, Address, Phone, Pager, Specialty, Location, Availability) Patient Details (PatientNo, PatientFirstName, PatientLastName, PatientAddress, PatientTelNo, PatientDob, PatientMaritalStatus, PatientDateRegistered, AppoinmentNo, PatientN

Arthur Miller Essay -- essays papers

Arthur Miller Arthur Miller, in his plays, deals with the injustice of society's moral values and the characters who are vulnerable to its cruelty. A good majority of these plays were very successful and earned numerous awards. According to Brooks Atkinson, a critic for the New York Times, Miller's play Death of a Salesman was successful because the play "is so simple in style and so inevitable in theme that it scarcely seems like a thing that has been written and acted. For Mr. Miller has looked with compassion into the hearts of some ordinary Americans and quietly transferred their hopes and anguish to the theater" (Babusci 1261). This play, in 1949, received the Pulitzer Prize, the New York Drama Critics Circle Award, the Antoinette Perry Award, the Donaldson Award, and the Theater Club Award (A Brief Chronology of Arthur Miller's Life and Works, http://www.ibiblio.org/...). Miller has said that he could not have written The Crucible at any other time for it is said that a play cannot be successful unless it speaks to its own time; hence McCarthyism was widespread when this play was written. Everyone was afraid of Communists, just like everyone was afraid of witches during The Crucible. This play won the Antoinette Perry Award and the Donaldson Award (Bloom, Modern Critical Interpretations: Arthur Miller's The Crucible 55). His play All My Sons was concerned with a man, Joe Keller, selling defective cylinder heads to the Air Force during World War II, causing the death of twenty-one pilots, one of whom was his elder son. The play focuses around this act and the consequences that arise from it. The play won the New York Drama Critics Circle Award. All of Miller's plays focus on one central idea, this idea being ... ...ct even though he was genuinely unable to visualize the public consequences of what for him was a private act. From an ethical standpoint he feels like he did nothing wrong, for "it is not that he cannot tell right from wrong but that his cast of mind cannot admit that he, personally, has any viable connection with his world, his universe, or his society" (Bloom, Modern Critical Interpretations: Arthur Miller's All My Sons 104). He believes that "family is the most important thing and that what is done in the name of family has its own justification" (Bloom, Modern Critical Interpretations: Arthur Miller's All My Sons 28). "I did it for you, it was a chance and I took it for you. I'm sixty-one years old, when would I have another chance to make something for you?...For you, a business for you!" (Bloom, Modern Critical Interpretations: Arthur Miller's All My Sons 65).

Tuesday, October 1, 2019

Dissatisfaction and Mortality Essay -- Literacy Analysis

In Gustave Flaubert’s Madame Bovary and Ivan Turgenev’s Fathers and Sons, the protagonists experience multiple conflicts with society as a whole and with their own place in that society. Emma Bovary and Yevgeny Bazarov, respectively, determine that the solution to their struggles is suicide. By revealing their characters’ reasoning, methods, and legacies, Flaubert and Turgenev seek to expose a fundamental human need for a sense of societal belonging through the resultant act of suicide, should that need go unfulfilled. The sense of despair that is linked to both Emma’s and Bazarov’s suicides originates from their stark incompatibility with the societies into which they were born. Each protagonist goes through a life long struggle to reshape his or her own niche in the community, in a manner reminiscent of attempting to force a key into a lock that it does not fit. Emma, who was brought up in a rural peasant family, had aspirations for a different place in life beginning as a young girl in a convent school. She kept a collection of â€Å"portraits of unidentified aristocratic English beauties† (Flaubert 872). By marrying Charles Bovary (a doctor), Emma raises herself up to the comfortable level of middle class; however, she clearly remains unsatisfied, as she obsesses over magazines from Paris, fills her house with luxury items, and pines for any contact with the upper class. Bazarov also has a more desirable relationship with society in mind. However, unlike Emma, he does not crave for changes in his own lifestyle, but instead he wishes for the majority of society to conform to his ideals. Upon meeting Arkady’s aristocratic father and uncle, Bazarov attempts to persuade them into agreeing with his progressive nihilistic views. He la... ...rimarily in the parallel legacies left behind by Emma and Bazarov. By focusing on their respective protagonists’ reasons and means for committing suicide, as well as their lasting impacts, nineteenth-century novelists Flaubert and Turgenev reveal the importance of possessing a sense of belonging in one’s society. These authors employ Emma’s and Bazarov’s preoccupations with advancing themselves in the eyes of society in order to convey the theme that putting forth such efforts is generally unnecessary (or even counterproductive) to lead a fulfilling life. Works Cited Flaubert, Gustave. Madame Bovary. 1856. Trans. Francis Steegmuller. The Norton Anthology of World Masterpieces. Ed. Sarah Lawall. 7th ed. Vol. 2. New York: Norton & Company, 1999. 850-1063. Print. Turgenev, Ivan. Fathers and Sons. Trans. Peter Carson. London: Penguin Classics, 2009. Print.

The Topic In Pakistani Perspective Health And Social Care Essay

Zimmerman reveals that TB was at that place in the mas of the 3000 old ages ago Egypt. Millet et al. , high spots that harmonizing to WHO estimates, in 2010 there were 8.8 million new instances of TB ( TB ) and 1.5 million deceases. As Terbium has been classically associated with poorness, overcrowding and malnutrition. Therefore, low income states and disadvantaged countries, within large metropoliss in developed states, present the highest Terbium incidences and TB mortality rates. On the other manus, diabetes mellitus has reached epidemic proportions worldwide, puting a significant load on health care services. Sullivan and Amor ( 2012 ) reveals that in recent old ages, strong grounds has been gathered to corroborate a nexus between TB and diabetes mellitus. In the first half of the twentieth century there were surveies that show the association between the diabetes and TB. Harmonizing to Ruslami, Aarnoutse, Alisjahbana, Ven and Crevel ( 2010 ) this association was neglected in th e 2nd half of the twentieth century because of the coming of widely available intervention for both diseases. In the last decennaries, with the current planetary growing of diabetes, the nexus between TB and DM is re-emerging. That nexus had been suspected for centuries. Many surveies now show that diabetes may be associated with an increased hazard of developing active TB. and that TB patients who besides have diabetes may hold higher rates of intervention failure and decease. Restrepo et Al. ( 2011 ) says that the part of diabetes to the load of TB may be more conspicuous in states where both diseases are extremely prevailing: Bangladesh, Brazil, China, India, Indonesia, Pakistan, and the Russian Federation are high-burden states and rank among the 10 states with the highest Numberss of diabetes patients and besides classified as high-burden for TB. Pakistan is one of the 4 staying states with endemic infantile paralysis and the 6th highest with load of TB. Search Scheme PubMed, CINHYL information bases, Springer nexus, Google bookman, SAGE diaries are searched. The cardinal footings, hunt engines, retrieved day of the month, filters, hunt strings and consequences found are given in the appendix A. The inclusion exclusion Criteria is discussed in the flow chart of appendix 2. Since the survey is related to the diabetes and TB, therefore the articles are chosen that discuss the relation of the two diseases and the clinical manifestation or the intervention modes of the patients. Aim of the survey This literature reappraisal aimed to find the association between the Diabetes and TB and to research the aggravating factors which indicate hapless TB intervention and diabetes control which lead to hapless results in patient attention. The emerging issues in Pakistan Ali et Al. Z. ( 2011 ) argues that the extensively drug-resistant TB ( XDR-TB ) has emerged as a major public wellness job worldwide. In add-on to this the multidrug-resistant ( MDR ) Mycobacterium TB strains are immune to at least the first-line anti-tuberculosis agents, Rifadin ( RIF ) and INH ( INH ) . says that Terbium remains the 2nd prima cause of decease in the universe and the per centum of multidrug-resistant TB ( MDRTB: resistant to at least INH and Rifadin ) among new TB instances seems to be stable at an estimated 3.4 % , at the same clip as 20 % of antecedently treated instances are MDR-TB Simultaneously Hakeem and Fawwad ( 2010 ) argues that the epidemiology and determiners of diabetes in Pakistan have peculiar combination of hazard factors. Strong cistron and environment interplay along with in-utero scheduling in context of low birth weight and gestational diabetes are the chief subscribers of a high prevalence of type 2 diabetes in Pakistan. The existent load of diabetes is due to its chronic complications taking to increased morbidity and mortality. Viswanathan et al. , ( 2012 ) stress that about tierce of worldaa‚ ¬a„?s population is infected with Mycobacterium TB and about 10 % of them are at hazard of developing active signifier of the disease in their life-time depending upon the interaction of the epidemiological three [ 1,2 ] . Available studies suggest that 95 % of patients with TB live in the low- and middle-income states and more than 70 % of patients with DM besides live in the same states, particularly in South East Asia.Importance of the Topic in Pakistani Perspectivesays that Pakistan ranks fifth among the states with highest load of TB in the universe and contributes to about 63 % of TB load in the Eastern Mediterranean Region. Estimated prevalence and incidence of TB in Pakistan is 310/100 000 and 231/100 000, severally. On the other manus the portions that It is estimated that in 2030, half of the 333 million people populating with diabetes will be from Asia entirely. Pakistan is an Asiatic state surrounding the Arabian Sea with a population of over 176 million as estimated in July 2009 [ 3 ] . The epidemic of diabetes is peculiarly relevant to Pakistan. Surveies from different parts of the state have estimated a prevalence of 6 % in work forces and 3.5 % in adult females populating in urban countries. In another survey Jayawardena et al. , ( 2012 ) reveals that diabetes is 9.3 % in males and 11.1 % in females prevalent in urban population of Pakistan whereas rural males are affected 10.1 % . Body Peoples with a weak immune system, as a consequence of chronic diseases such as diabetes, are at a higher hazard of come oning from latent to active Terbium says that the dominant manifestation of diabetes mellitus is hyperglycaemia which is responsible to prefer the growing, viability and extension of tubercle B. Furthermore, Sen et Al. ( 2009 ) it was thought that the attendant addition in dextrose in the tissues resulted in reduced opposition to infection in situ and besides in impaired fix capacity. Predilection to infection was besides attributed to local tissue acidosis and instability of electrolytes. In add-on to this, Geerlings and Hoepelman ( 1999 ) proposed that neutrophils from people with diabetes had reduced chemotaxis and oxidative killing possible than those of non-diabetic controls, and besides the leukocyte bactericidal activity was reduced in people with diabetes, particularly those with hapless glucose control. Sen et Al. ( 2009 ) says that another cause of increased susceptibleness is due to reduced production of interleukin-1 beta, and tumour mortification factor by the peripheral blood monocytes in patients with TB and co-existent diabetes mellitus. Hussain and Hussain says that the likely cause of increased incidence of pneumonic TB in diabetics could be due to desert in host defences and immune cell maps, with predominately engagement of cell mediated immune response. In diabetics, infection with tubercle B leads to farther change in cytokines, monocyte aa‚ ¬ † macrophages and CD4/CD8 T cell populations. The balance of T lymphocyte bomber sets CD4 and CD8 plays a cardinal function in the transition of host defense mechanism against mycobacterium and has a profound influence on the rate of arrested development of active pneumonic Terbium. Because of these all says that due to these all factors taken together, these surveies strongly back up the hypothesis that DM straight impairs the innate and adaptative immune responses necessary to counter the proliferation of TB. Medicines done a survey and identifies that the patients of the TB and diabetes have the issues of nonadherence, uncontrolled diabetes mellitus, inauspicious drug reactions and single patientaa‚ ¬a„?s medicine related jobs. On of the possible grounds of the hapless gulucose control is discussed by Ruslami, Aarnoutse, Alisjahbana, Ven and Crevel ( 2010 ) and says that the Plasma degrees of several antidiabetic drugs are significantly lower when co-administered with rifampicin. Campbell et Al. ( 2001 ) says that rifampicin is one of the most powerful and wide spectrum antibiotics against bacterial pathogens and is a cardinal constituent of anti-TB therapy.Patients of diabetes and TB have a higher hazard of decease and intervention backslidingIt is highlighted from the surveies that diabetic patient with TB have the poorer intervention results and, have the higher hazard of decease among these patients. Sullivan and Amor ( 2012 ) study that sputum civilizations at the completion of 6 months of TB intervention were 22.2 % positive in the diabetic patients and 6.9 % of those without diabetes. Furthermore it is revealed that the comparative hazard of decease of 1.89 among TB patients with diabetes when compared to non-diabetic patients. Restrepo et al. , ( 2011 ) says that the nexus between these two diseases may go even more meaningful in coming old ages, as the prevalence of fleshiness and diabetes are expected to lift dramatically in the resource-poor countries where TB thrives. research that diabetes increases the hazard of failure, decease and backsliding among patients with TB. Furthermore suggests that there is a demand for increased attending to intervention of TB in people with diabetes. More over to better the quality of attention among the TB patients proving for suspected diabetes, improved glucose control, and increased clinical and curative monitoring.Principles of Management of Co-existent Tuberculosis & A ; Diabetes and Prophylaxis:Niazi and Kalra ( 2012 ) . Proper guidance is critical sing disease class of patients with co-existing DM & A ; TB.Patients with terrible DM along with TB should be started on insulin therapy & A ; one time stabilized, shifted to unwritten hypoglycaemic agents ( OHA ) . Mild Diabetes needs merely OHA. Vigorous & A ; good chemotherapy is indispensable. Adverse effects of drugs need close monitoring. Isoniazid ( INH ) demands particular attending with compulsory disposal of vitamin B6 ( vitamin B6 ) . Patients with co-existant disease may necessitate drawn-out intervention, depending on diabetes control & A ; intervention response.The Amercian thoracic society recommended in 1986, 22 that diabetics, peculiarly ill controlled Insulin Dependent Diabetes Mellitus ( IDDM ) patients, should be given INH prophylaxis. Role of primary chemoprophylaxis and secondary prophylaxis in our community needs to be discussed. Corris, Unwin and Critchley ( 2012 ) . Stevenson, C. , Stevenson, A. R. , Critchey, J. A. , Forouhi, N. , Roglic, G. , Williams, B. G. , et Al. ( 2007 ) . Decision With increasing rates of fleshiness and diabetes worldwide and continued high rates of TB in low-income states, we can anticipate that the figure of persons who have both TB and diabetes mellitus will increase markedly in the coming decennaries. More research in this mostly ignored country would hence be good. The nexus between TB ( TB ) and diabetes mellitus ( DM ) has occupied the centre phase of treatment. Experts have raised concern about the unifying epidemics of TB and diabetes peculiarly in the low to medium income states like India and China that have the highest load of TB in the universe, and are sing the fastest addition in the prevalence of DM. There is good grounds that DM makes a significant part to TB incidence. The immense prevalence of DM in India, may be lending to the increasing prevalence of TB. This reappraisal looks at the nexus between these two meeting epidemics. We discuss the epidemiology, clinical characteristics, microbiology and radiology, and direction and intervention results of patients with TB and diabetes mellitus.